← Back to Crime & Security

AI-Generated Code Flaw Exposes 345,000 Stolen Payment Cards in Cybercrime Breach

Crime & SecurityAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

LONDON (AP) — A cybercriminal marketplace known as Jerry's Store has suffered a massive data breach, exposing 345,000 stolen payment card details after an insecurely configured server was left accessible online. The incident highlights the growing risks associated with artificial intelligence tools in the development of malicious infrastructure.

The breach was discovered on May 1, 2026, when security researchers identified an exposed server hosting sensitive cardholder data. The server, which served as the backend for Jerry's Store, a carding service that sells stolen financial information, lacked proper authentication protocols. Investigators determined that the vulnerability stemmed from code generated by Cursor AI, an artificial intelligence development tool produced by Anysphere.

The flaw allowed unauthorized users to access the database without credentials, leading to the public leakage of the stolen payment information. The exposed data includes credit and debit card numbers, expiration dates, and security codes, which are typically used by fraudsters to make unauthorized purchases or sell on dark web marketplaces.

Cursor AI, which assists developers in writing code, generated the server configuration without implementing necessary security measures. The tool's output failed to include authentication checks, leaving the server vulnerable to exploitation. This incident marks one of the first documented cases where AI-generated code directly contributed to a significant data breach in a cybercriminal operation.

CyberNews researchers, who first identified the exposure, noted that the server remained accessible for an extended period before being taken down. The researchers emphasized that the breach underscores the potential dangers of relying on AI tools without human oversight, particularly in high-risk environments.

The incident has raised concerns among cybersecurity experts about the increasing use of AI in cybercrime. As AI tools become more sophisticated, they are being adopted by both legitimate developers and malicious actors. The ease with which AI can generate functional code may lower the barrier to entry for cybercriminals, enabling them to build more complex and dangerous infrastructure with minimal technical expertise.

Anysphere, the company behind Cursor AI, has not yet commented on the incident. However, the company has previously stated that its tools are intended for legitimate software development and that users are responsible for ensuring the security of their code.

The exposure of 345,000 payment card details poses a significant risk to cardholders, who may face unauthorized transactions and identity theft. Financial institutions and payment processors are likely to monitor the situation closely and may issue warnings to affected customers.

It remains unclear how long the server was exposed before the breach was discovered, and whether the data has already been exploited by fraudsters. Additionally, the extent of the damage and the number of affected individuals are still being assessed.

Cybersecurity experts are urging organizations to exercise caution when using AI-generated code, particularly for sensitive applications. The incident serves as a stark reminder that AI tools, while powerful, require careful oversight to prevent security vulnerabilities.

As investigations continue, the focus remains on mitigating the impact of the breach and preventing similar incidents in the future. The use of AI in cybercrime is expected to evolve, presenting new challenges for cybersecurity professionals worldwide.